Red Teamers/Pentesters: Strategies for File Transfer in Isolated Environments?

Hello everyone, I've been pondering a scenario and am curious about your experiences and strategies. Imagine you've successfully pivoted from a workstation to a more secure server during an engagement. This server, however, does not have internet access, and for various reasons, you can't or prefer not to transfer your tools or files from the workstation or download them directly onto the workstation. Have you ever faced such a situation? Do you consider transfering tools from an workstation an 'opsec risk'. If so, how did you navigate this challenge to transfer the necessary files or tools to the server? I'm interested in hearing about the creative solutions or workarounds you've employed in these kinds of isolated environments.

submitted by /u/Same_Ad_4081
[link] [comments]

from hacking: security in practice https://ift.tt/MGwQmV7

Comments